Support

Tuesday, November 22, 2016

Many of us think cybercriminals are masterminds who execute futuristic computer attacks to steal millions of dollars. The truth is, they are simply scam artists trying to steal from unsuspecting Internet users like you and me. One of their favorite techniques is called “phishing.”

Phishing is a form of digital fraud by which the attacker tries to trick you into giving them your personal information. Usually attackers use emails or phone calls to impersonate individuals or businesses you recognize, or have a relationship with, such as banks or Internet Service Providers. Phishing attacks can cost a company millions of dollars. For regular folks, it could mean the loss of one’s entire life savings. according to Wombat Security’s 2016 State of the Phish report, 85% of organizations have suffered from a phishing attack.

Phishing attacks also are rampant among individual users. Sadly, 97% of people around the world cannot identify a phishing email. Even more frightening is the fact that 30% of all phishing emails are made to look so authentic that many people unknowingly open them. This is why companies and consumers must be diligent about protecting themselves from these scams. To arm you against phishing attacks, we’ve outlined some of the most commonly used tactics and ways to protect yourself:

Five Ways to Identify and Protect Yourself from Phishing Attacks

Don’t automatically trust the name displayed. Just because your email says it’s from your bank or grandmother, doesn’t mean that it is. Don’t always trust the name displayed in the “FROM” field of a new email you receive. A favorite tactic among phishers is to mask the display name of an email the name of somebody in your contacts. This tactic is known as spoofing. For example, if a fraudster wanted to impersonate your bank, the displayed name would read “your bank.” You can avoid this trap by taking your mouse and hovering over the displayed name to view the full email address If the email address doesn’t match the name, it’s a good bet that it came from a fraudster. If it is a phishing attack, the email should be deleted and reported as spam immediately. Also, be sure you have spam protection enabled.

Be on the lookout for non-personal salutations.If the email’s opening line begins with a vague greeting, such as, “Dear valued customer,” it’s a good sign that it came from a scammer. Legitimate businesses that have a relationship with you will have your contact information, and will usually address you by your first and/or last name.

Look but don’t click on suspicious links.Fraudsters love to embed malicious links in the text of an email. If you have received and opened an email with a suspicious looking link, we have an easy way to confirm that the link is legitimate. Simply hover over the link and a preview showing the first few lines of text and images from that site. If the link doesn’t match the site preview, it is highly probable that site is from a fraudster. Don’t click on the link and delete the email. Fraudulent links will lead you to an alternate site or an online advertisement -- all of which may contain malicious malware.

Look out for frequent spelling errors.Spelling errors in an email subject line or the body of an email is a dead giveaway that the message is from a phishing scammer trying to get your information. If you see frequent spelling errors, anywhere in the subject line or email body, delete the email or confirm who it came from first before responding to it or downloading anything from it.

Look but don’t download suspicious attachments.A common practice of email phishing is to include attachment viruses and malware that can damage files on your computer, steal private information and even spy on you without your knowledge. You can easily spot this by looking at the file extension such as .bat, .btm, exe or m4k. If you don’t recognize those extensions, the attachment may have come from a scammer and the email should be evaluated using the other factors mentioned in this post.

These tips are just a few ways you can protect yourself from phishing scams. Keep in mind that new tactics to scam people are always being developed. You’ll need to keep your mind’s fraud sensor turned all the way up every time you get an email you weren’t expecting. By following these simple tips, you can save yourself a lot of time and money from these scams.

Wednesday, June 08, 2016

With the summer season quickly approaching, chances are you’ll be taking some time off of work. Chances are also good that you’ll come back from vacation to an inbox overflowing with email. We understand the challenges of managing a heavy inbox, which is why Mail2World recommends a few tips to keep you from being tethered to your email while you’re away, and to help smooth your transition back from your getaway.

PRE VACATION

1. Send out a “Heads Up”Before you leave, contact the 10 to 12 people who email you the most often and let them know that you will be away for a specific length of time. Be sure to leave a contact person who can take care of emergencies while you’re away.

2. Create a Vacation Auto-ResponseHaving a vacation response is an effective way to automatically notify people that you are out of the office and unavailable. The auto-response also can help deter them from continuously emailing you and loading your inbox with unnecessary messages.

3. Create Email Filters or rulesCreating filters, also sometimes known as rules, is an effective way to prioritize messages that arrive during your vacation. Use filters to sort important emails so you know which to tackle first when you’re back in the office. Sorting messages into separate folders will allow for easy organization of messages based on subject or sender, or by personal or business relationship. For example, you could create a rule for messages from your boss, and another one for important clients. To learn more about how to create and use filters and rules, read our “Using Email Filters, Folders and other Tips” article.

4. Delegate responsibilities Delegate a point person for your projects. In addition, give that person a way to reach you in case of a real emergency. Be sure to meet with them ahead of time to define what a “real emergency” means and what issues warrant contact with you.

POST VACATION

When you get back, set aside time to address important emails that have accumulated. Start with folders dedicated to your boss and important projects, then read and respond to other messages, as needed.

After you have reviewed your important messages, you can go through some less important messages, such as newsletter subscriptions, news alerts and others. Remember, email is a work tool and shouldn’t be transformed into work within itself.

Finally, it is important to remember that everyone has their own method for handling email. It’s up to you to decide which tips work best in your particular circumstances. We hope you found these suggestions helpful.

Tuesday, November 24, 2015

Ever wonder why you don’t get responses to support email as fast as you expect? It’s understandable. No one likes to wait. We live in an in an instant gratification world, and when we want information, we want it now. So when we are forced to wait for a response or resolution to a problem, we often get frustrated.

In an effort to help you get the fastest response possible from our Support Team, we’ve outlined some of the most common reasons delays occur, and the items to include in your support email request to help us get you up and running again. Here goes!

Reasons You Experience a Delay

The Support Team Doesn’t Have an Email Address to Reach You

The number one reason our Support Team doesn’t respond in a timely manner is that they can’t reach you! The Support Team needs an email address where they can reach you – not the email address of the account experiencing problems -- but an alternate. Nine out of 10 times, people don’t leave an email address.

They don’t have a clear understanding of the problem. In order to properly investigate, the Support Team needs to understand what the issue is.

To ensure you get the fastest turnaround possible, here are four items that should be included in your support request:

4 Things to Include in th e Support Form

An Alternate Email Address As mentioned above, the number one reason our Support Team doesn’t respond to support requests in a timely manner is that they can’t reach you! Always indicate the affected email and an alternate one for correspondence.

A Detailed Description of the ProblemPlease include a detailed description of the problem. Be sure to include any error messages, screenshots, message headers, etc. that might be helpful in helping us to identify the problem.

Identify the WebMail Application Affected (i.e. Email, Contacts, Calendar, Drive) Knowing what application you were using when the error occurred will enable the support team to isolate the problem and focus on testing that specific application. (i.e. Webmail, Address book or Calendar). For example, if the issue occurs when adding a contact to the address book, the Support Team can test various solutions within that specific area. Ignoring other areas that are functioning properly will expedite the resolution process.

The Email Client You are Using (Webmail or other External Client)Even the email client you are using can play a part in errors. Be sure to indicate whether you are using Webmail through a browser or through an external mail client, like Outlook. This information will help the team replicate the exact environment where your issue occurred, reducing the time they spend trying to replicate it. If you are using a browser, the same principal applies: indicate the brand name for the browser you are using. To find the name and version, simply click on the Help Menu and select “About.”

Email is a very important communication tool and we know how frustrating it is when systems don’t work properly. That’s why we’ve developed this Support Requests Tip Sheet. Our goal is to provide you with excellent service, and these tips ensure we can respond to your requests as quickly as possible. Best,

Wednesday, December 12, 2012

The Mail2World Reseller Program was built for businesses
that are looking to increase revenues, enhance customer loyalty, find new
business, and add integrated email technology to their offerings. As a
Mail2World reseller, you will have access to a wealth of online marketing
materials and tools to help you sell the Mail2World platform under your brand
to your customers.

Easy Setup and Admin Controls

Resellers will have access to a robust administrative
control panel to private-label email services. Through the reseller center you can manage
users, update profiles and access marketing materials.

Robust Email Features

Through a comprehensive suite of email products, value added
services and intuitive file sharing features, our partners have the most
comprehensive suite of hosted business applications available!

Wednesday, November 07, 2012

Here at Mail2World, we like to ensure our customers have
access to their accounts through any device they wish including the popular iOS
devices. Our support staff wanted us to
share a common issue with setting up POP3/IMAP access through the Mail
application on the iPhone. The iPhone defaults to secure settings and times out
after 15 minutes of not being able to connect. After the 15 minutes, a Pop-up
message will appear saying, “Cannot Connect Using SSL. Do you want to try
setting up the account without SSL?” Please see the image below.

To resolve the issue, please select Yes.

The key is to be patient. Don’t become frustrated by the
iPhone’s temporary lack of responsiveness. After you have inputted the host names,
usernames, passwords, and clicked the save button be sure to wait until you
receive the above message. Click yes and wait for the iPhone to accept all the
non-SSL settings.

Once again, the key to a successful iPhone setup is patience.
Happy emailing everyone!

Tuesday, September 11, 2012

Email is a powerful communication tool . The power behind most email communication is a business’ ability to manage and retrieve pertinent information for business continuity. When designing its email platform, Mail2World considered the needs of business email administrators and their users. Administrators need the ability to generate reports that can provide important user management and statistics. Through the Email Admin Control Center administrators can:

Manage end-user accounts

Customize the look-and-feel of the email environment for all users via Site Management

View statistics

Retrieve reports on users, usage, and logins etc.

Modify accounts & turn specific features on/off

Access is available to administrators who manage large enterprise or small business email environments and Internet service providers.

Here are a few of the tools available to administrators in the Admin Control Center:

View Statistics – Administrators can generate statistical reports to monitor information that is important to their organization.

These are just a few of the features available to administrators through the Mail2World Admin Control Center. Find out more about Mail2World’s email admin control center on our website: http://www.mail2world.net/en/administration-and-reports or contact us about how we can help you with your business email communications.

Tuesday, July 17, 2012

If you’ve been following the latest news on the technology industry, specifically the email industry you know that the Mozilla Corporation has decided to stop any further development on its popular email client, Thunderbird. (Read more about the company’s decision here. ) So, what’s next for Thunderbird users? And what should you do if your email client should ever stop developing or supporting it’s software?

An Email Client vs an Email Service Provider:

First, it’s important to understand the difference between a desktop client and a service provider. A desktop email client is a downloadable email program that is used to view messages directly from a personal computer. Users can configure the desktop client using POP and IMAP mail protocols to retrieve their messages. While a service provider hosts the servers where the actual messages are kept, maintained and monitored. Ensuring that customers always have access to their email accounts is our number 1 priority. This is why it is important to ensure your email is hosted by a trusted service provider, like Mail2World. In today’s business world email is a mission critical business tool. Service providers like us means you can use any mainstream email client that works best for you.

Thunderbird is an email client which means you can export your email messages to another client using the configurations provided by your email service provider. For our Mail2World customers we have a couple of alternative solutions available:

Login directly to your account and manage your email via the Webmail or mobile interfaces on the Web.

Or

If you’re a Mail2World Platinum User, you can download your messages to your desktop using any number of free desktop clients available for download.

And

Configure your account using Mail2World’s mail management tools. *

*Through Mail2world’s platinum service, Mail2World platinum account holders can configure their accounts to a number of desktop clients using both POP and IMAP protocols.

So you see, if an email desktop client is discontinued it’s not the end of the world. You can transfer your email, contacts, calendar, and more! We provide support documentations, user tutorials, and configuration guides to help provide a smooth transition when switching to a new desktop client.

Thursday, June 28, 2012

Everybody knows that countless unwanted emails can clog up your inbox, it slows individual productivity and for businesses it can affect your bottom line. Unfortunately, it's still a problem that's only getting bigger. Mail2World’s spam detection filters catch most unwanted emails but sometimes you still have to check your spam folder for stray email messages. So we want to share some of our wisdom, and let you know why non-spam messages sometimes get marked as spam.

1. Forwarding – if you are one of those users who like to forward jokes, chain letters, pictures of cats and puppies to people, chances are those messages will be tagged as spam. To avoid this:

Remove all the unnecessary headers if your message has been forwarded before.

We recommend that you send the message to no more than 10 people within an hour. Your friend’s will also thank you if you space out your emails.

Be sure that all you recipient’s email addresses are valid and still in use. Frequent bounce backs will also mark messages as spam.

2. Subject Lines – Subject lines are important because they provide some information on the topic of the message. But, it if is a one word subject such “Test” or “Hi” chances are any email spam filter will tag messages with simple subject lines as spam.

3. Large recipient List – if you are sending an email to more than 50 email addresses at once chances are your message will once again be tagged as spam. Even 10 is too much. Limit your emails to include only pertinent recipients.

4. What’s in your FROM field – Does your email address show or does it say for example, Sales@marketingteamexample.com? If it doesn’t look like a personal address you could be tagged as spam.

5. Minimize use of Attachments – emails with multiple JPG, XLS and DOCs can be flagged as spam because receiving mail servers are configured to not accept attachments because viruses and malware could be attached. If you have multiple, take advantage of Mail2World’s Backpack feature. There you can upload, store and share all the files you want.

Hope you all have found this information helpful. Happy emailing everyone!

Monday, June 11, 2012

For the last few days we’ve received several news alerts about high profile politicians getting their personal email accounts hacked. Luckily, high profile politicians tend to have the resources and power to recover their accounts and bring those perpetrators to justice. But what if it happens to you? Do you have the resources to recover access to your email account? This is precisely why a Mail2World email account is so important and the tools we provide you with give you the power to recover quickly. Here are some tips we’d like to share with you on how to prevent your email account from being compromised:

Passwords– We can't overstate enough the importance of a strong password for your email account. Keeping people out of your account will always be the best way to protect yourself.

Have a Second Account – Assume you’ve lost all access to your primary account. Have a second account with all your contacts. Also, have your mail forwarded to another account so that you’re able to alert your contacts that your primary account has been compromised.

Set up your email account with correct information (initially) – It is very important that users provide accurate information when registering a new Mail2World email account. If the information is inaccurate it could make retrieving access to an account virtually impossible. And if you are a platinum account holder, our support staff will need to confirm your identity before providing you with access to your account again.

Set up quality security questions – Set up security questions for all email accounts that are open. The best questions are the ones that only you know the answers too.

Keep your password to yourself – your password is for you and you alone. Mail2World will never ask you for your password. Keep your password safe.

What if you’ve followed all of these steps and your account is still compromised? Yes, it can still happen. Contact us right away via support@mail2world.com.

Wednesday, May 16, 2012

Have you ever considered a pay for email Mail2World account? For $19.99 a year what are the additional advantages you get? As a Mail2World platinum member you get several additional features not offered to free users, including live phone support. Other providers offer paid-for plans but are missing key offerings such as POP and IMAP mail protocols. Most providers only offer POP, which may be ok if you only check your mail on one machine, but if you check it on multiple machines then you will want to become a Platinum member and get IMAP.

As a Mail2World Platinum account holder you also get access to these additional platinum upgrade features:

Account Preservation

Multiple Signatures

Unrestricted Email Forwarding

Unlimited Email Rules

Unlimited Message Color Coding

Auto-Responder

Email Scheduling

POP/IMAP Access

WAP and Mobile Email Syncing

These are just a few of features available to Mail2World Platinum account holders. So sign up now, for only $19.99 a year.

All you need to do to sign up is:

Log into your free M2W account

Click on Options in the upper right hand corner

Click Platinum Services ( e X t r a s ! )

Click on the buy link

So you see, paying for email isn’t so crazy it could actually turn out to be one of the smartest things you have ever done with your email account.

My Other Accounts

More About Mail2World

Mail2World is a world-class email hosting provider. We offer business email, mobile email, reseller email hosting, and private-label email services. With the richest feature set in the industry, Mail2World's customer base includes hundreds of reputable brands and prominent organizations from around the world, including publicity-traded corporations, telecom carriers, mobile operators, and some of the most-recognized universities and online social portals. Solutions include business email, mobile email, reseller email hosting, email security, email encryption and FailSafe Protection.